{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:50Z","timestamp":1773615770994,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"5","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.3103\/s0146411621050023","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T12:54:58Z","timestamp":1635857698000},"page":"444-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients"],"prefix":"10.3103","volume":"55","author":[{"given":"D. R.","family":"Denslin Brabin","sequence":"first","affiliation":[]},{"given":"Sriramulu","family":"Bojjagani","sequence":"additional","affiliation":[]},{"given":"D.R. Denslin","family":"Braja","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"7367_CR1","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W. Hong","year":"2012","unstructured":"Hong, W. and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching, IEEE Trans. Inf. Forensic Secur., 2012, vol. 7, no. 1, pp. 176\u2013184.\u00a0https:\/\/doi.org\/10.1109\/TIFS.2011.2155062","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"7367_CR2","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L. Guo","year":"2014","unstructured":"Guo, L., Ni, J., and Shi, Y.Q., Uniform embedding for efficient JPEG steganography, IEEE Trans. Inf. Forensic Secur., 2014, vol. 9, no. 5, pp. 814\u2013825. \u00a0https:\/\/doi.org\/10.1109\/TIFS.2014.2312817","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"7367_CR3","first-page":"1341","volume":"10","author":"D.R. Denslin Brabin","year":"2015","unstructured":"Denslin Brabin, D.R. and Paul Perinbam, J.R., A high capacity data hiding scheme for digital images using normalization, Int. J. Appl. Eng. Res., 2015, vol. 10, no. 1, pp. 1341\u20131350.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"7367_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3103\/S0146411616020048","volume":"50","author":"V.V. Sergeichik","year":"2016","unstructured":"Sergeichik, V.V. and Ivaniuk, A.A., Digital watermark and fingerprint in variable rank linear-feedback shift register, Autom. Control Comput. Sci., 2016, vol. 50, no. 2, pp. 107\u2013115. \u00a0https:\/\/doi.org\/10.3103\/S0146411616020048","journal-title":"Autom. Control Comput. Sci."},{"key":"7367_CR5","doi-asserted-by":"publisher","first-page":"66254","DOI":"10.1109\/ACCESS.2018.2878456","volume":"6","author":"T.B. Taha","year":"2018","unstructured":"Taha. T.B., Ngadiran, R., and Ehkan, P., Adaptive image watermarking algorithm based on an efficient perceptual mapping model, IEEE Access, 2018, vol. 6, pp. 66254\u201366267. \u00a0https:\/\/doi.org\/10.1109\/ACCESS.2018.2878456","journal-title":"IEEE Access"},{"key":"7367_CR6","first-page":"259","volume":"3","author":"P.-F. Shiu","year":"2018","unstructured":"Shiu, P.-F., Lin, C.-C., Jan, K.-K., and Chang, Y.-F., A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy, J. Network Intell., 2018, vol. 3, no.\u00a04, pp. 259\u2013277.","journal-title":"J. Network Intell."},{"key":"7367_CR7","first-page":"213","volume":"10","author":"F. Sharmin","year":"2019","unstructured":"Sharmin, F. and Khan, M.I., Image steganography using combined nearest and farthest neighbors methods, Int. J. Adv. Comput. Sci. Appl., 2019, vol. 10, no. 11, pp. 213\u2013219.","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"7367_CR8","doi-asserted-by":"publisher","first-page":"5748","DOI":"10.1016\/j.eswa.2010.10.058","volume":"38","author":"M.-J. Tsai","year":"2011","unstructured":"Tsai, M.-J. Liu, J., and Wang, C.-S., A game-theoretic framework for the security system of visible watermarking, Expert Syst. Appl., 2011, vol. 38, no. 5, pp. 5748\u20135754. \u00a0https:\/\/doi.org\/10.1016\/j.eswa.2010.10.058","journal-title":"Expert Syst. Appl."},{"key":"7367_CR9","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1007\/s11227-013-0969-9","volume":"66","author":"C.-Y. Weng","year":"2013","unstructured":"Weng, C.-Y., Zhang, Y.H., Lin, L.C., and Wang, S.-J., Visible watermarking images in high quality of data hiding, J. Supercomput., 2013, vol. 66, no. 2, pp. 1033\u20131048. \u00a0https:\/\/doi.org\/10.1007\/s11227-013-0969-9","journal-title":"J. Supercomput."},{"key":"7367_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.imavis.2013.02.002","volume":"31","author":"P.-Y. Lin","year":"2013","unstructured":"Lin, P.-Y., Chen, Y.-H., Chang, C.-C., and Lee, J.-S., Contrast-adaptive removable visible watermarking (CARVW) mechanism, Image Vision Comput., 2013, vol. 31, no. 4, pp. 311\u2013321.\u00a0https:\/\/doi.org\/10.1016\/j.imavis.2013.02.002","journal-title":"Image Vision Comput."},{"key":"7367_CR11","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jss.2014.04.038","volume":"95","author":"P.-Y. Lin","year":"2014","unstructured":"Lin, P.-Y., Imperceptible visible watermarking based on postcamera histogram operation, J. Syst. Software, 2014, vol. 95, pp. 194\u2013208. \u00a0https:\/\/doi.org\/10.1016\/j.jss.2014.04.038","journal-title":"J. Syst. Software"},{"key":"7367_CR12","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11042-013-1423-y","volume":"72","author":"M.-J. Tsai","year":"2014","unstructured":"Tsai, M.-J., Liu, J., Yin, J.-S., and Yuadi, I., A visible wavelet watermarking technique based on exploiting the contrast sensitivity function and noise reduction of human vision system, Multimedia Tools Appl., 2014, vol. 72, no. 2, pp. 1311\u20131340. \u00a0https:\/\/doi.org\/10.1007\/s11042-013-1423-y","journal-title":"Multimedia Tools Appl."},{"key":"7367_CR13","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s11042-013-1714-3","volume":"74","author":"H. Yang","year":"2015","unstructured":"Yang H. and Yin, J., A secure removable visible watermarking for BTC compressed images, Multimedia Tools Appl., 2015, vol. 74, no. 6, pp. 1725\u20131739. \u00a0https:\/\/doi.org\/10.1007\/s11042-013-1714-3","journal-title":"Multimedia Tools Appl."},{"key":"7367_CR14","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.ins.2016.07.015","volume":"367\u2013368","author":"F.Y. Shih","year":"2016","unstructured":"Shih, F.Y. and Zhong, X., High-capacity multiple regions of interest watermarking for medical images, Inf. Sci., 2016, vols. 367\u2013368, pp. 648\u2013659. \u00a0https:\/\/doi.org\/10.1016\/j.ins.2016.07.015","journal-title":"Inf. Sci."},{"key":"7367_CR15","doi-asserted-by":"publisher","first-page":"7605","DOI":"10.1007\/s11042-015-2685-3","volume":"75","author":"H. Agarwal","year":"2016","unstructured":"Agarwal, H., Sen, D., Raman, B., and Kankanhalli, M., Visible watermarking based on importance and just noticeable distortion of image regions, Multimedia Tools Appl., 2016, vol.\u00a075, no. 13, pp. 7605\u20137629. \u00a0https:\/\/doi.org\/10.1007\/s11042-015-2685-3","journal-title":"Multimedia Tools Appl."},{"key":"7367_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10916-017-0795-3","volume":"41","author":"R. Thanki","year":"2017","unstructured":"Thanki, R., Borra, S., Dwivedi, V., and Borisagar, K., A RONI based visible watermarking approach for medical image authentication, J. Med. Syst., 2017, vol. 41, no. 9, p. 143. \u00a0https:\/\/doi.org\/10.1007\/s10916-017-0795-3","journal-title":"J. Med. Syst."},{"key":"7367_CR17","doi-asserted-by":"publisher","first-page":"7903198","DOI":"10.1155\/2017\/7903198","volume":"2017","author":"H. Santoyo-Garcia","year":"2017","unstructured":"Santoyo-Garcia, H., Fragoso-Navarro, E., Reyes-Reyes, R., Cruz-Ramos, C., and Nakano-Miyatake, M., Visible watermarking technique based on human visual system for single sensor digital cameras, Secur. Commun. Networks, 2017, vol. 2017, p. 7903198. \u00a0https:\/\/doi.org\/10.1155\/2017\/7903198","journal-title":"Secur. Commun. Networks"},{"key":"7367_CR18","doi-asserted-by":"publisher","first-page":"13301","DOI":"10.1007\/s11042-016-3757-8","volume":"76","author":"N. Mohammad","year":"2017","unstructured":"Mohammad, N., Sun, X., Yang, H., Yin, J., Yang, G., and Jiang, M., Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images, Multimedia Tools Appl., 2017, vol. 76, no. 11, pp.\u00a013301\u201313313. \u00a0https:\/\/doi.org\/10.1007\/s11042-016-3757-8","journal-title":"Multimedia Tools Appl."},{"key":"7367_CR19","doi-asserted-by":"publisher","first-page":"19327","DOI":"10.1007\/s11042-017-5370-x","volume":"77","author":"C.-C. Chen","year":"2018","unstructured":"Chen, C.-C. and Yeh, H.-C., Using dynamic pixel value mapping method to construct visible and reversible image watermarking scheme, Multimedia Tools Appl., 2018, vol. 77, no.\u00a015, pp. 19327\u201319346. \u00a0https:\/\/doi.org\/10.1007\/s11042-017-5370-x","journal-title":"Multimedia Tools Appl."},{"key":"7367_CR20","doi-asserted-by":"publisher","first-page":"105955","DOI":"10.1016\/j.optlaseng.2019.105955","volume":"127","author":"Z. Ye","year":"2020","unstructured":"Ye, Z., Wang, H., Xiong, J., and Wang, K., Simultaneous full-color single-pixel imaging and visible watermarking using Hadamard-Bayer illumination patterns, Opt. Lasers Eng., 2020, vol. 127, p. 105955. \u00a0https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105955","journal-title":"Opt. Lasers Eng."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621050023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621050023","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621050023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:22Z","timestamp":1773612262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621050023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["7367"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621050023","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"24 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}